Featured content
FORRESTERNOW
As the coronavirus dominates the global headlines, businesses should take both defensive and strategic actions—focusing on customers, employees, and brand. Read more »
Charts & Figures
-
US Full-Time Employee Methods Of Communication
March 31, 2021
-
A CISO's First 100 Day Timeline
March 31, 2021
-
The Top Four Mistakes CISOs Make In Their First 100 Days
March 31, 2021
Search Results
-
Report A CISO's First 100 Days
Few Wins But Big Losses At Stake Early In Your Tenure
The energy and momentum created when a new leader takes the reins unlocks opportunities, but if CISOs don't handle their first 100 days well, they risk alienating stakeholders and isolating...
-
Webinar Top Systemic Risks Of 2021
They originate as systemic risk events before becoming your current nightmare scenario. These external events impact your firm and your customers but are completely out of your control. Most firms...
-
Report Future Requirements For IaaS Platform Native Security In 2021 To 2022
Essential Cross-Cloud Services That Should Be Part Of Your Cloud Strategy
March 17, 2021 | Andras CserInfrastructure-as-a-service platform native security (IPNS) plays a crucial role in securing data, workloads, and network communications in public cloud platforms such as Amazon Web Services (AWS),...
-
Report The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
The 11 Providers That Matter Most And How They Stack Up
March 3, 2021 | David HolmesIn our 28-criterion evaluation of DDoS mitigation solution providers, we identified the 11 most significant ones — A10 Networks, Akamai Technologies, Alibaba Cloud, Amazon Web Services, Cloudflare,...
-
Report Use Forrester's CISO Strategic Canvas To Align Security With Business
Strategic Plan: The S&R Practice Playbook
Security leaders know it's critical to align their efforts to the business, speak their business colleagues' language, and show support for business objectives. But with never-ending inbound...
-
Report Best Practices And Trends: Voice Biometrics
Voice Biometrics Can Improve Security And Customer Experience
Voice biometrics offers improved account access security and user experience. Modern voice biometrics solutions resist replay attacks and have improved in accuracy and performance in the past five...
-
Report The Top Systemic Risks, 2021
Landscape: The Governance, Risk, And Compliance Playbook
They originate as systemic risk events before becoming your current nightmare scenario. These external events impact your firm and your customers but are completely out of your control. Most firms...
-
Report Remove The Mystery From Security Metrics
Performance Management: The S&R Practice Playbook
February 5, 2021 | Jeff PollardCISOs continue to have difficulty creating meaningful security metrics despite a decade of discussion. Without good metrics, the security organization can't participate in business conversations...
-
Report Now Tech: Cloud Security Gateways, Q1 2021
Forrester's Overview Of 16 Cloud Security Gateway Providers
January 26, 2021 | Andras CserYou can use cloud security gateway (CSG, also known as cloud access security broker or CASB) solutions to detect and protect against: 1) data loss, 2) excessive sensitive data access, and 3) use of...
-
Report The Top Trends Shaping Anti-Money Laundering In 2020
Robotic Process Automation, Cryptocurrencies, Real-Time Detection, And KYC Processes Gain Importance
August 10, 2020 | Andras CserWith new real-time transactions gaining popularity and new legalized product markets (such as cannabis) emerging, anti-money-laundering (AML) regulations are getting tougher and more complex. This...
-
Report Now Tech: Customer Identity And Access Management (CIAM), Q2 2020
Forrester's Overview Of 24 CIAM Providers
June 24, 2020 | Andras CserYou can use CIAM solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions also serve and secure the identity aspects of marketing campaigns, customer...
-
Report Use Privileged Identity Management Pricing Insight For Buyer Advantage
Understand Pricing Mechanics To Optimize Your PIM Procurement
Privileged identity management (PIM) solutions are a high-value security solution, but purchasing one can be complex. They offer many capabilities, with multiple pricing options, integrations, and...
-
Report Assess Your Cloud Security Readiness
Leverage Forrester's Custom Tool To Assess Your Cloud Security Maturity Across Six Major Technology Competencies
May 29, 2020 | Andras CserAs firms migrate computing and data resources to the cloud, security remains a top concern and priority for both operational and compliance reasons. S&R professionals should use our custom tool, a...
-
Report Develop Actionable Business-Centric Identity And Access Management Metrics
Performance Management: The Identity And Access Management Playbook
Many security and risk (S&R) professionals continue to struggle to sustain identity and access management (IAM) as a top business technology priority. S&R pros who succeed at nurturing their...
-
Report Understand The State Of Identity And Access Management, 2020
Benchmarks: The Identity And Access Management Playbook
This data-driven report provides spending and technology adoption benchmarks for security and risk (S&R) leaders responsible for developing a comprehensive identity and access management (IAM)...
-
Report Craft Zero Trust Security Metrics That Matter
Performance Management: The Zero Trust Security Playbook
Forrester's Zero Trust (ZT) Model of information security demands that security teams eliminate the dangerous trust assumptions underpinning perimeter-based security architectures. When you embrace...
-
Report The State Of Data Security And Privacy, 2020
February 27, 2020 | Heidi SheyThis data-driven report outlines breach trends, data security and privacy technology adoption trends, and related trends in global firms for 2019 through 2020. Understanding these trends and their...
-
Report Build The Business Case For GRC
Business Case: The Governance, Risk, And Compliance Playbook
The business case for governance, risk management, and compliance (GRC) efforts too often relies on the fear of costly events or regulatory action. This report helps GRC leaders elevate the...
-
Report Forrester's 2019 Consumer Privacy Segmentation: Europe
Understand Consumer Privacy Preferences And Behaviors To Improve Engagement, Trust, And Experience
November 13, 2019 | Enza IannopolloIn this report, we explain how privacy professionals can apply Forrester's Consumer Privacy Segmentation to understand how privacy perspectives vary by geography across Europe. Armed with this...
-
Report The Forrester Wave™: Anti-Money Laundering Solutions, Q3 2019
The Eight Providers That Matter Most And How They Stack Up
September 24, 2019 | Andras CserIn our 32-criterion evaluation of anti-money laundering (AML) solution providers, we identified the eight most significant ones — ACI, BAE Systems, Featurespace, Feedzai, FICO TONBELLER,...
-
Report The US Healthcare Security Benchmark, 2018 To 2019
Healthcare Pros Must Spend Wisely To Counter Increasing Complexity
In the past, IT security teams within US healthcare providers had much smaller budgets than those within other industries. This is no longer the case, as budget increases in healthcare have come as...
Content Type
ApplyFilters
Industry
- Healthcare (6)
- Financial Services (5)
Topics
- Metrics (39)
- Benchmarks (28)
- Return On Investment (ROI) (11)
- Key Performance Indicators (KPIs) (6)
- Balanced Scorecard (2)
Methodology
- Now Tech (12)
- Forrester Wave (7)
- Total Economic Impact (TEI) (3)
- Maturity Assessment (1)
- Online Maturity Assessment (1)
Region
- North America (9)
- Europe (3)
Vendor
- BAE Systems (3)
- FICO (3)
- SAS (3)
Analyst
- Andras Cser (26)
- Enza Iannopollo (10)
- Heidi Shey (7)
- Jeff Pollard (6)
- David Holmes (4)
- Sean Ryan (4)
- Alla Valente (3)
- Renee Murphy (3)
- Salvatore Schiano (3)
- Jinan Budge (2)
- Chris Sherman (1)
- Jess Burn (1)
- Paul McKay (1)
- Stephanie Balaouras (1)